نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

2003
Shijie Zhou Zhiguang Qin Jinde Liu

This paper concentrates on analyzing and discussing the basic secure service: key management (PKey). By adding a security service layer, PKey is carefully built on the base of a routing and location layer to simple the application development. According as the layered architecture of PKey, some key protocols of PKey, which include key producing, retrieving and transferring, are designed and ana...

2013
Jiyoung Yang Hyundong Lee Shi-Kook Rhyoo Mokdong Chung

Today many companies introduce new mobile office environments evolved from the recent rapid development in mobile device technologies. Most of the recent mobile office systems use a simple authentication scheme such as ID/Password. This method is easy to use, but it does not consider the user's context. Thus it cannot provide appropriate security service required by the user’s proper contexts. ...

2013
Ankur Shukla Akanksha Gupta Manish Shrivastava Kunal Purohit

In this paper we considered the method of describing the telecommunication system providing VoD services using hierarchical structure with optimization and security features. Today we have seen that many times, during the downloading process of various videos, there will be disturbance or hanging and failures due to the low bandwith and other technical problems. In this paper we are proposing s...

2004
Valentina Casola Raffaele Chianese Nicola Mazzocca Massimiliano Rak Antonino Mazzeo

The increasing interest in telecommunication systems and the wide spreading of computer networks within commercial and scientific field, are going in the direction of a deep integration of phone and data systems into a single network infrastructure. We are particular interested in security issues that arise in such context, thinking, for example, about authentication and billing problems. The a...

2015
Karim El Defrawy Gavin Holland Gene Tsudik

Cyber-Physical Systems (CPS) are increasingly permeating our daily lives, particularly in the automotive domain since a modern vehicle can be regarded as one complex CPS. Given their increasing importance, CPS (and automotive systems as a representative case) are becoming attractive targets for attacks. Several techniques with varying assumptions and limitations have been proposed to detect and...

Journal: :Decision Support Systems 2005
G. B. Tanna Manish Gupta H. Raghav Rao Shambhu J. Upadhyaya

One of the fastest growing applications in the banking arena is Electronic Bill Presentation and Payment (EBPP), driven primarily by a desire to reduce costs associated with issuing and settling physical bills. EBPP is a secure system for companies to electronically present bills and other related information to their customers, and host the secure payment of these bills. This paper puts forth ...

2017
Erik C. Nisbet

This report explores the Russian public demand for internet freedom. Produced by Erik Nisbet with the Center for Global Communication Studies and the Russian Public Opinion Research Center, the study seeks to uncover attitudes and opinions about internet regulation, censorship of online content, and the potential for citizen mobilization and protest. Key findings from the report include: • Almo...

2003
Tom Coffey Puneet Saidha Peter Burrows

Non-repudiation is a security service concerned with preventing a denial by one of the principals involved in a communication of having participated in all or part of the communication. Principals exchange evidence information, which proves their participation in the communication. The evidence is digitally signed, making it non-forgeable and undeniable. In this paper, a non-repudiation communi...

2013
M. B. Nirmala

The security issue in a wireless sensor network (WSN) has been drawing considerable research attention in recent years. However Key management, a basic security service, becomes the core design for various security services, such as encryption and authentication. To increase the connectivity of each key in a large-scale WSN and to enlarge its maximum supportable network size and to provide good...

2001
Sam X. Sun

In this paper, we propose that identity reference used over distributed communication should be defined independent from any attributes and/or the public keys associated with the underlying subject. This allows the identity reference to be persistent over changes made to the attributes and/or the public keys. We further suggest to separate the trust establishment over distributed communication ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید